Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Size: px
Start display at page:

Download "Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices"

Transcription

1 Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager June 2015

2 Introduction Research Objectives Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices In order to assess how enterprise organizations are collecting, processing, analyzing, and operationalizing their threat intelligence programs, ESG surveyed 304 IT and information security professionals representing enterpriseclass (1,000 employees or more) organizations in North America. All respondents were involved in the planning, implementation, and/or daily operations of their organization s threat intelligence program, processes, or technologies. The survey and overall research project were designed to answer the following questions about: Threat intelligence programs 1. Do enterprise organizations have threat intelligence programs in place? 2. If so, how are they structured and funded? 3. How mature are these programs? 4. What are the primary objectives for threat intelligence programs? Threat intelligence knowledge and opinions 1. Do security professionals have adequate threat intelligence skills? 2. If not, where are the knowledge gaps? 3. What is driving threat intelligence program strategy? 4. What are the biggest threat intelligence challenges for organizations? The organization(s) responsible for threat intelligence programs 1. Which groups are responsible for threat intelligence programs today? Do multiple groups participate in these programs? 2. Who reviews threat intelligence and for what purposes? 3. What do organizations actually do with the threat intelligence they collect, process, and analyze? Endpoint security technologies 1. What types of internal and external threat intelligence data are organizations collecting? 2. How do they select external threat feeds and services? 3. Is threat intelligence data integrated with other security and IT technologies? 4. Are security professionals aware of threat intelligence standards? If so, are these standards important? Threat intelligence sharing 1. Are organizations sharing threat intelligence today? If so, is this a regular or ad-hoc occurrence? 2. Are organizations willing to share internally-derived threat intelligence with the US Government? If so, what types of programs and assurances would they want from Washington? Survey participants represented a wide range of industries including financial services, manufacturing, business services, communications and media, and government. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

3 Research Methodology To gather data for this report, ESG conducted a comprehensive online survey of IT and information security professionals from private- and public-sector organizations in North America (United States and Canada) between February 27, 2015 and March 10, To qualify for this survey, respondents were required to be IT professionals directly involved in the planning, implementation, and/or daily operations of their organization s threat intelligence program, processes, or technologies. Respondent organizations also needed to currently be using external threat intelligence as part of its threat intelligence program. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, we were left with a final total sample of 304 IT and information security professionals. Please see the Respondent Demographics section of this report for more information on these respondents. Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding.

4 Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Respondent Demographics The data presented in this report is based on a survey of 304 qualified respondents. The figures below detail the demographics of the respondent base, including individual respondents current job functions, as well as respondent organizations total numbers of employees, primary industries, and annual revenues. Respondents by Current Job Function Respondents current job function within their organizations is shown in Figure 1. Figure 1. Survey Respondents by Current Job Function Which of the following best describes your current responsibility within your organization? (Percent of respondents, N=304) Information security management, 4% Information security staff, 1% Senior information security management (e.g., CISO, CSO, etc.), 5% IT staff, 4% IT management, 29% Senior IT management (e.g., CIO, VP of IT, Director of IT, etc.), 58% Source: Enterprise Strategy Group, Respondents by Number of Employees The number of employees in respondents organizations is shown in Figure 2. Figure 2. Survey Respondents by Number of Employees How many total employees does your organization have worldwide? (Percent of respondents, N=304) 40,000 to 49,999, 10% 50,000 or more, 4% 30,000 to 39,999, 4% 1,000 to 2,499, 35% 20,000 to 29,999, 6% 10,000 to 19,999, 6% 5,000 to 9,999, 13% 2,500 to 4,999, 24% Source: Enterprise Strategy Group, 2015.

5 Respondents by Industry Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Respondents were asked to identify their organizations primary industry. In total, ESG received completed, qualified responses from individuals in 19 distinct vertical industries, plus an Other category. Respondents were then grouped into the broader categories shown in Figure 3. Figure 3. Survey Respondents by Industry What is your organization s primary industry? (Percent of respondents, N=304) Government (Federal/National, State/Province/Local), 4% Communications & Media, 6% Other, 15% Financial (banking, securities, insurance), 23% Business Services (accounting, consulting, legal, etc.), 8% Retail/Wholesale, 11% Health Care, 11% Manufacturing, 22% Source: Enterprise Strategy Group, Respondents by Annual Revenue Respondent organizations annual revenue is shown in Figure 4. Figure 4. Survey Respondents by Annual Revenue 25% 20% 15% 10% 5% What is your organization s total annual revenue ($US)? (Percent of respondents, N=304) 2% 2% 5% 8% 17% 15% 20% 19% 11% 2% 0% Less than $50 million $100 $50 million to $ million to million $ million $250 million to $ million $500 million to $ million $1 billion to $4.999 billion $5 billion to $9.999 billion $10 billion to $ billion $20 billion or more Not applicable (e.g., public sector, non-profit) Source: Enterprise Strategy Group, 2015.

6 Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Contents List of Figures... 3 List of Tables... 3 Executive Summary... 4 Report Conclusions... 4 Introduction... 7 Research Objectives... 7 Research Findings... 8 Threat Intelligence Program Overview... 8 Organizational Aspects of Threat Intelligence Program Threat Intelligence Data Sources Threat Intelligence Operations Threat Intelligence Standards Threat Intelligence Sharing Future Threat Intelligence Strategy and Planning Conclusion Research Implications for Cybersecurity Professionals Research Implications for Information Security Vendors Research Implications for Governments Research Methodology Respondent Demographics Respondents by Current Job Function Respondents by Number of Employees Respondents by Industry Respondents by Annual Revenue... 45

7 Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices List of Figures Figure 1. Length of Time Threat Intelligence Program Has Been in Place... 8 Figure 2. Maturity Level of Organization s Threat Intelligence Program... 9 Figure 3. Reasons for Establishing a Threat Intelligence Program Figure 4. Top Objectives of Organization s Threat Intelligence Program Figure 5. Individuals/Groups Most Responsible for Threat Intelligence Program Figure 6. Number of Individuals that Review Threat Intelligence Daily Figure 7. Staffing Level Dedicated to Threat Intelligence Figure 8. How Threat Intelligence Program Is Funded Figure 9. Respondents Rate Organization s Threat Intelligence Skills Figure 10. Metrics to Assess the Success of Threat Intelligence Program Figure 11. Types of Internal Data Collected and Analyzed Today Figure 12. Types of External Data Collected and Analyzed Today Figure 13 Number of Different External Threat Intelligence Sources Used Figure 14. Most Important Types of External Threat Intelligence Data Figure 15. Criteria Used to Evaluate and Choose External Commercial Threat Intelligence Feeds/Services Figure 16. Difficulty Determining Quality and Efficacy of Threat Intelligence Feeds Figure 17. Redundancy of Commercial Threat Intelligence Feeds Figure 18. Use of Threat Intelligence to Automate Prevention/Remediation Activities and Security Operations.. 24 Figure 19. Challenges Experienced with Collecting and Analyzing External Threat Intelligence Figure 20. Familiarity with Threat Intelligence Standards Figure 21. Importance of Threat Intelligence Standards Figure 22. Use of Threat Intelligence Standards and Open Source Tools Figure 23. Sharing of Internally-derived Threat Intelligence with Other Organizations/Industry ISACs Figure 24. Value of Threat Intelligence Sharing Between Federal Agencies and Private Organizations Figure 25. Willingness to Share Threat Intelligence with US Government Agencies Figure 26. Filtering of Internally-derived Threat Intelligence Shared with Other Organizations/Industry ISACs Figure 27. Actions US Government Would Need to Take to Make a Public/Private Threat Intelligence Sharing Program Valuable Figure 28. Future Spending on Threat Intelligence Figure 29. Organizations Plans for Internal and External Threat Intelligence Figure 30. Actions Organizations Will Take to Support Their Threat Intelligence Programs Figure 31. Survey Respondents by Current Job Function Figure 32. Survey Respondents by Number of Employees Figure 33. Survey Respondents by Industry Figure 34. Survey Respondents by Annual Revenue List of Tables Table 1. Length of Time Threat Intelligence Program Has Been in Place, by Company Size... 9 Table 2. Areas in Which Threat Intelligence Skills Are Fair or Poor, by Industry Table 3. Difficulty Determining Quality and Efficacy of Threat Intelligence Feeds, by Industry Table 4. Use of Threat Intelligence to Automate Prevention/Remediation Activities and Security Operations, by Industry Table 5. Familiarity with Threat Intelligence Standards, by Company Size Table 6. Importance of Threat Intelligence Standards, by Company Size Table 7. Willingness to Share Threat Intelligence with US Government Agencies, by Company Size All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at

8 20 Asylum Street Milford, MA Tel: Fax:

Enterprise Database Trends in a Big Data World

Enterprise Database Trends in a Big Data World Research Report Abstract: Enterprise Database Trends in a Big Data World By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager July 2014 Introduction

More information

The State of Mobile Computing Security

The State of Mobile Computing Security Research Report Abstract: The State of Mobile Computing Security By Jon Oltsik, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager February 2014

More information

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011 Research Report Abstract: The Impact of Big Data on Data Analytics By Julie Lockner and Bill Lundell With Jennifer Gahm and John McKnight September 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Enterprise Big Data, Business Intelligence, and Analytics Trends

Enterprise Big Data, Business Intelligence, and Analytics Trends Research Report Abstract: Enterprise Big Data, Business Intelligence, and Analytics Trends By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jennifer Gahm, Senior Project Manager

More information

The Shift Toward Data Protection Appliances

The Shift Toward Data Protection Appliances Research Report Abstract: The Shift Toward Data Protection Appliances By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager March 2015

More information

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012 Research Report Abstract: Social Enterprise Adoption Trends By Tom Petrocelli, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jenn Gahm, Senior Project Manager June 2012 2012 Enterprise

More information

Online File Sharing and Collaboration: Deployment Model Trends

Online File Sharing and Collaboration: Deployment Model Trends Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager

More information

Platform-as-a-service Usage and Satisfaction Study

Platform-as-a-service Usage and Satisfaction Study Research Report Abstract: Platform-as-a-service Usage and Satisfaction Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager

More information

Web Application Security Testing Tools and Services

Web Application Security Testing Tools and Services Research Report Abstract: Web Application Security Testing Tools and Services By Jon Oltsik, Senior Principal Analyst, and Jane Wright, Senior Research Analyst With Jennifer Gahm April 2013 Introduction

More information

Research Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight

Research Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight Research Report Abstract: Solid-state Storage Market Trends By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight November 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved.

More information

Research Report. Remote Office/Branch Office Technology Trends. July 2011

Research Report. Remote Office/Branch Office Technology Trends. July 2011 Research Report Remote Office/Branch Office Technology Trends By Bill Lundell, Jon Oltsik, and Lauren Whitehouse With John McKnight and Jenn Gahm July 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: The Evolution of Server Virtualization. November 2010

Research Report. Abstract: The Evolution of Server Virtualization. November 2010 Research Report Abstract: The Evolution of Server Virtualization By Mark Bowker and Jon Oltsik With Bill Lundell, John McKnight, and Jenn Gahm November 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010

Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010 Research Report Abstract: The Impact of Server Virtualization on Data Protection By Lauren Whitehouse and Bill Lundell With Jennifer Gahm September 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

2015 Data Storage Market Trends

2015 Data Storage Market Trends Research Report Abstract: 2015 Data Storage Market Trends By Mark Peters, Senior Analyst and Bill Lundell, Senior Research Analyst With Scott Sinclair, Analyst and Jenn Gahm, Senior Project Manager October

More information

The Convergence of Big Data Processing and Integrated Infrastructure

The Convergence of Big Data Processing and Integrated Infrastructure Research Report Abstract: The Convergence of Big Data Processing and Integrated Infrastructure By Evan Quinn, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Brian Babineau, Vice

More information

Trends in Private Cloud Infrastructure

Trends in Private Cloud Infrastructure Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011 Research Report Abstract: e-discovery Market Trends A View from the Legal Department By Katey Wood and Brian Babineau With Bill Lundell and Jennifer Gahm October 2011 2011 Enterprise Strategy Group, Inc.

More information

Corporate Online File Sharing and Collaboration Market Trends

Corporate Online File Sharing and Collaboration Market Trends Research Report Abstract: Corporate Online File Sharing and Collaboration Market Trends By Kristine Kao, Market Research Analyst, Terri McClure, Senior Analyst, and Jane Wright, Senior Production Analyst

More information

Research Report. Abstract: Trends in Data Protection Modernization. August 2012

Research Report. Abstract: Trends in Data Protection Modernization. August 2012 Research Report Abstract: Trends in Data Protection Modernization By Jason Buffington, Senior Analyst, and Bill Lundell, Senior Research Analyst August 2012 Introduction Research Objectives Research Report:

More information

Data Protection-as-a-service (DPaaS) Trends

Data Protection-as-a-service (DPaaS) Trends Research Report Abstract: Data Protection-as-a-service (DPaaS) Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager and Adam DeMattia,

More information

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013 Research Report Abstract: 2013 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2013 Introduction Research

More information

Cloud Computing Adoption Trends:

Cloud Computing Adoption Trends: Research Report Abstract: Cloud Computing Adoption Trends: Software- and Infrastructure-as-a-Service Usage Among Enterprise and Midmarket Organizations By Bill Lundell With John McKnight and Jennifer Gahm

More information

Platform-as-a-service Language Use Study

Platform-as-a-service Language Use Study Research Report Abstract: Platform-as-a-service Language Use Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst & Jennifer Gahm, Senior Project Manager February

More information

Backup and Archiving Convergence Trends

Backup and Archiving Convergence Trends Research Report Abstract: Backup and Archiving Convergence Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Research Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight

Research Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight Research Report Abstract: Endpoint Device Backup Trends By Lauren Whitehouse With Bill Lundell and John McKnight December 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research

More information

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014 Research Report Abstract: 2014 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2014 Introduction Research

More information

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013 Research Report Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst June 2013 Introduction Research

More information

Research Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight

Research Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight Research Report Abstract: E-Mail Archiving Market Trends By Brian Babineau With Bill Lundell and John McKnight May 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction: Research

More information

ESG Threat Intelligence Research Project

ESG Threat Intelligence Research Project TM Enterprise Strategy Group Getting to the bigger truth. ESG Threat Intelligence Research Project May 2015 Jon Oltsik, Senior Principal Analyst Project Overview 304 completed online surveys with IT professionals

More information

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell Research Report Abstract: The Impact of Cloud Computing on the Channel By Jeff Hine and Bill Lundell September 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research Objectives

More information

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm RESEARCH REPORT Abstract Storage Resource Management Market on the Launch Pad By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm October 2007 Introduction Research Objectives The term

More information

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All

More information

Cybersecurity Skills Shortage: A State of Emergency

Cybersecurity Skills Shortage: A State of Emergency Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Research Perspectives

Research Perspectives Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed

More information

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015 4 Cloud Computing: Not a Question of If, but Rather

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst Abstract: The intersection of big data and security analytics

More information

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Timely patch management is a security best practice,

More information

White. Paper. Rethinking Endpoint Security. February 2015

White. Paper. Rethinking Endpoint Security. February 2015 White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242) Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research

More information

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013 White Paper Cloud Computing Demands Enterprise- class Password Management and Security By Jon Oltsik, Senior Principal Analyst April 2013 This ESG White Paper was commissioned by McAfee (a Division of

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80% Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

White. Paper. The Road to the Hybrid Cloud: Signposts on the Way to Success. July 2015

White. Paper. The Road to the Hybrid Cloud: Signposts on the Way to Success. July 2015 White Paper The Road to the Hybrid Cloud: Signposts on the Way to Success By Kevin Rhone, Senior Partnering Consultant July 2015 This ESG White Paper was commissioned by VMWare and is distributed under

More information

The ESG Cybersecurity Maturity Model

The ESG Cybersecurity Maturity Model ESG Brief The ESG Cybersecurity Maturity Model Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: As part of its research, ESG regularly uses a scoring system to divide survey populations

More information

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014 White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed

More information

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012 White Paper Extracting the Value of Big Data with HP StoreAll Storage and Autonomy By Terri McClure, Senior Analyst and Katey Wood, Analyst December 2012 This ESG White Paper was commissioned by HP and

More information

Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey. Final Results. Jon Oltsik, Senior Principal Analyst

Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey. Final Results. Jon Oltsik, Senior Principal Analyst TM Enterprise Strategy Group Getting to the bigger truth. Cisco: ACL Survey Final Results Jon Oltsik, Senior Principal Analyst Summary of Key Findings 2 Project Overview 154 completed online surveys

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast White Paper SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast By Bill Lundell, Senior Research Analyst January 2013 This ESG White Paper was commissioned by Mimecast

More information

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center White Paper Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center By Mark Bowker, Senior Analyst, and Perry Laberis, Senior Research Associate March 2013 This ESG White Paper

More information

White. Paper. Big Data Advisory Service. September, 2011

White. Paper. Big Data Advisory Service. September, 2011 White Paper Big Data Advisory Service By Julie Lockner& Tom Kornegay September, 2011 This ESG White Paper was commissioned by EMC Corporation and is distributed under license from ESG. 2011, Enterprise

More information

2010 Networking Spending Trends Date: February 2010 Author: Jon Oltsik, Principal Analyst

2010 Networking Spending Trends Date: February 2010 Author: Jon Oltsik, Principal Analyst ESG Research Brief 2010 Networking Spending Trends Date: February 2010 Author: Jon Oltsik, Principal Analyst Abstract: In general terms, spending on networking equipment will be better than last year but

More information

How To Understand The Needs Of The Network

How To Understand The Needs Of The Network White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

Research Report. Abstract: Scale-out Storage Market Forecast 2010-2015. February 2011. By Terri McClure

Research Report. Abstract: Scale-out Storage Market Forecast 2010-2015. February 2011. By Terri McClure Research Report Abstract: Scale-out Storage Market Forecast 2010-2015 By Terri McClure February 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Market Forecast Overview Forecast Scope Designed

More information

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014 White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license

More information

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011 Solution Impact Analysis NEC Powers ServIT's Custom Hosting Solutions By Mark Bowker September, 2011 This ESG publication was commissioned by NEC and is distributed under license from ESG. 2011, Enterprise

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

VMware and the Need for Cyber Supply Chain Security Assurance

VMware and the Need for Cyber Supply Chain Security Assurance White Paper VMware and the Need for Cyber Supply Chain Security Assurance By Jon Oltsik, Senior Principal Analyst September 2015 This ESG White Paper was commissioned by VMware and is distributed under

More information

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG. White Paper Network Encryption and its Impact on Enterprise Security By Jon Oltsik, Senior Principal Analyst February 2015 This ESG White Paper was commissioned by Blue Coat and is distributed under license

More information

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology White Paper A Comparative TCO Study: VTLs and Physical Tape With a Focus on Deduplication and LTO-5 Technology By Mark Peters February, 2011 This ESG White Paper is distributed under license from ESG.

More information

Compensating Security Controls for Windows Server 2003 Security

Compensating Security Controls for Windows Server 2003 Security ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft

More information

Information-driven Security and RSA Security Analytics and RSA ECAT

Information-driven Security and RSA Security Analytics and RSA ECAT White Paper Information-driven Security and RSA Security Analytics and RSA ECAT By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by RSA, The Security Division

More information

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM ESG Solution Showcase SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract:

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG.

This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG. White Paper Closing the Big Data Management and Security Gap By Nik Rouda, Senior Analyst October 2014 This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG. 2 Contents

More information

ESG Research Final Sponsor Report

ESG Research Final Sponsor Report ESG Research Final Sponsor Report The Modernization of Data Protection By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager April 2012 2012

More information

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014 White Paper Evaluating Sync and Share Solutions Balancing Security, Control, and Productivity By Terri McClure, Senior Analyst September, 2014 This ESG White Paper was commissioned by Code42 and is distributed

More information

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments. White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned

More information

Reducing the Critical Time from Incident Detection to Containment

Reducing the Critical Time from Incident Detection to Containment White Paper Reducing the Critical Time from Incident Detection to Containment By Jon Oltsik, Senior Principal Analyst May 2014 This ESG White Paper was commissioned by Bradford Networks and is distributed

More information

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst

By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst White Paper How to Accelerate IT Resiliency Through Virtualization By Jason Buffington, Senior Analyst, and Monya Keane, Research Analyst August 2015 This ESG White Paper was commissioned by Axcient and

More information

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG. White Paper Network Solutions for Modern Data Centers By Bob Laliberte, Senior Analyst October 2013 This ESG White Paper was commissioned by Extreme Networks and is distributed under license from ESG.

More information

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility

More information

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG. White Paper Application Virtualization: An Opportunity for IT to do More with Much Less By Mark Bowker, Senior Analyst November 2012 This ESG White Paper was commissioned by DH2i and is distributed under

More information

White. Paper. EMC Personalized Support Services: A Focus on Keeping IT Healthy. November 2012

White. Paper. EMC Personalized Support Services: A Focus on Keeping IT Healthy. November 2012 White Paper EMC Personalized Support Services: A Focus on Keeping IT Healthy By Terri McClure, Senior Analyst November 2012 This ESG White Paper was commissioned by EMC and is distributed under license

More information

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned

More information

The Challenge. ESG Case Study

The Challenge. ESG Case Study ESG Case Study Primatics Financial Delivers SaaS-based Solution Excellence Using EMC s XtremIO Date: March 2015 Authors: Mark Peters, Senior Analyst; Adam DeMattia, Market Research Analyst; and Monya Keane,

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

White. Paper. Customer Service & Support in the Age of IT-as-a-Service. July, 2012

White. Paper. Customer Service & Support in the Age of IT-as-a-Service. July, 2012 White Paper Customer Service & Support in the Age of IT-as-a-Service By Terri McClure, Senior Analyst July, 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG.

More information

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011 White Paper The SMB Market is Ready for Data Encryption By Mark Peters January, 2011 This ESG White Paper was commissioned by Tandberg Data and is distributed under license from ESG. 2011, Enterprise Strategy

More information

Enterprise Strategy Group Getting to the bigger truth. Radware ADC Survey. Final Results. Jon Oltsik, Senior Principal Analyst

Enterprise Strategy Group Getting to the bigger truth. Radware ADC Survey. Final Results. Jon Oltsik, Senior Principal Analyst TM Enterprise Strategy Group Getting to the bigger truth. Radware ADC Survey Final Results Jon Oltsik, Senior Principal Analyst Project Overview 243 completed online surveys with IT professionals responsible

More information

A Storage Network Architecture for Highly Dynamic Virtualized and Cloud Computing Environments

A Storage Network Architecture for Highly Dynamic Virtualized and Cloud Computing Environments White Paper A Storage Network Architecture for Highly Dynamic Virtualized and Cloud Computing Environments Juniper s QFabric Solution for EMC Storage Environments By Bob Laliberte, Senior Analyst May 2013

More information

Product Brief. Overview. Analysis

Product Brief. Overview. Analysis Product Brief NetScout Expands ngenius Monitoring Switch Portfolio Date: January 2013 Author: Bob Laliberte, Senior Analyst and Perry Laberis, Senior Research Associate Abstract: NetScout has announced

More information

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010 White Paper Benefiting from Server Virtualization Beyond Initial Workload Consolidation By Mark Bowker June, 2010 This ESG White Paper was commissioned by VMware and is distributed under license from ESG.

More information

White. Paper. Contemporary IT Services: The Business Value of HDS Global Services. May 2015

White. Paper. Contemporary IT Services: The Business Value of HDS Global Services. May 2015 White Paper Contemporary IT Services: The Business Value of HDS Global Services By Mark Peters, Practice Director & Senior Analyst May 2015 This ESG White Paper was commissioned by HDS and is distributed

More information

White. Paper. Desktop Virtualization, Management, and Security. November, 2009. By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst

White. Paper. Desktop Virtualization, Management, and Security. November, 2009. By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst White Paper Desktop Virtualization, Management, and Security By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst November, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved Contents

More information

White. Paper. The Big Data Security Analytics Era Is Here. January 2013

White. Paper. The Big Data Security Analytics Era Is Here. January 2013 White Paper The Big Data Security Analytics Era Is Here By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by RSA Security and is distributed under license from

More information

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER: THREAT INTELLIGENCE RANKING WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes

More information

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper

More information

HGST Object Storage for a New Generation of IT

HGST Object Storage for a New Generation of IT Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE HGST Object Storage for a New Generation of IT Date: October 2015 Author: Scott Sinclair, Storage Analyst Abstract: Under increased

More information

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: In spite of marginal progress, privileged accounts

More information

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) White Paper Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White

More information

The Data Center of the Future

The Data Center of the Future 2010, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Data Center of the Future By Mark Bowker and Lauren Whitehouse March, 2010 This ESG White Paper was commissioned by Veeam and is

More information